Solved

Exchange 2007 CAS server redundancy and high availability.

Posted on 2008-06-14
4
2,041 Views
Last Modified: 2008-06-14
I have an Exhange 2007 2 node CCR with one CAS HUB Transport server.I need to setup a 2nd CAS HUB Transport Server for redundancy and high availability.
With Client Access--You can use NLB or a third-party hardware-based NLB device for Client Access server high availability. Does the NLB or DNS  round robin have to be on the same subnet ?
How would you setup the Exchange Exchange CAS Server NLB or DNS round robin, what are the pros and cons?
0
Comment
Question by:cap7
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 6

Accepted Solution

by:
DocCan11 earned 500 total points
ID: 21785686
This is actually a combination of questions.. First lets deal with the hub.. no they do not have to be on the same IP subnet BUT (and this is a BIG but) they MUST be in the same AD site if you want them to provide fault tolerance for each other.. Exchange 2007 only allows a hub to communicate with Mailbox servers in the SAME AD site.. so be careful with this..

DNS round robinning just returns all records that match a query regardless of where they are.

NLB is far superior to DNS becuase DNS will continue to send clients to the down node and only after they timeout will they connect to the up node.. with NLB it will occur automatically..

Here is an article that covers it..

http://technet.microsoft.com/en-us/library/bb742455.aspx

0
 

Author Comment

by:cap7
ID: 21786885
Does the NLB needs a file witness share ?
0
 
LVL 6

Expert Comment

by:DocCan11
ID: 21786936
no.. you only need a witness share when you are deciding to implement CCR and that only protects a Mailbox server role
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Find out what you should include to make the best professional email signature for your organization.
This article lists the top 5 free OST to PST Converter Tools. These tools save a lot of time for users when they want to convert OST to PST after their exchange server is no longer available or some other critical issue with exchange server or impor…
In this video we show how to create a Contact in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Recipients >> Contact ta…
In this video we show how to create an email address policy in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.:  First we need to log into the Exchange Admin Center. Navigate to the Mail Flow…

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question